CROSS REFERENCE TO RELATED APPLICATION(S)This application is a continuation-in-part of copending U.S. application Ser. No. 13/734,671, filed Jan. 4, 2013, which is a continuation-in-part of copending U.S. application Ser. No. 13/415,365, filed Mar. 8, 2012, which claims the benefit of Provisional Patent Application No. 61/453,737, filed Mar. 17, 2011, in its entirety and is hereby incorporated by reference.
FIELD OF THE INVENTIONThe present invention generally relates to access control systems, and more particularly, to wireless access control systems for door locks.
BACKGROUNDA passive keyless entry (PKE) system offers an increased level of convenience over a standard lock and key, for example, by providing the ability to access a secure building or device without having to find, insert, and turn a traditional key. A user may simply approach and touch a locked PKE lock and with little if any pause, the lock grants this user access if they are carrying an authorized token.
A PKE system is currently used in an automotive application and may offer increased convenience by identifying drivers and unlocking the car as they approach and grab the handle. Automotive access is traditionally given by inserting a key into the lock or by pushing buttons on a traditional remote keyless entry (RKE) system. In contrast, a PKE system grants access with reduced user interaction through the use of a hands free token carried by the driver.
Several technical challenges have been encountered during the engineering of a radio frequency (RF) PKE system, for example, for use in a residential lock. The desired basic perceived behavior of the PKE system in a residential application may be as follows: 1) the user approaches and touches the lock; 2) the lock authenticates the user with a minimally perceived delay; 3) the lock unlocks; 4) the lock may not operate if the authorized user is outside a desired range and the lock is touched by another, unauthorized, user; 5) the lock may not operate if the authorized user is on the inside of the house, and the lock is touched on the outside by an unauthorized user; and 6) the battery powered lock needs several months or more worth of battery life to prevent inconvenient and costly battery changes. 7) if a PKE fob is used, battery power needs to be over a year. 8) the lock can provide anytime, or configurable limited time, access control. 9) the lock has the ability to be locked without a remote access device
Indeed, as will be appreciated by those skilled in the art, with respect to the above desired basic perceived behavior of the PKE system in a residential application, primary challenges to be addressed include items 1 (Simplicity), 2 (speed), 4 (distance), 5 (location), 6-7 (battery life), and 8-9 (convenience). Accordingly, it may be desirable to improve authentication speed, proximity measurement, location determination, decrease power consumption, and increase convenience for example.
SUMMARY OF THE INVENTIONA wireless access control system includes a remote access device for authorizing access control to a lock when present on a user who touches, or triggers a proximity detector, of the lock.
A wireless access control system includes a remote access device for authorizing access control to a lock when the user possessing the authorized remote access device is within an activation range of the lock and door. If the authorized user is outside of activation range, signal range, or inside the lock and door, the remote access device will not be enabled to lock or unlock the door.
To calibrate the wireless access control system, the remote access device captures and stores radio frequency signal strength of each false reject event, i.e. access is denied where the criteria indicates that it should be granted. The system utilizes a learning algorithm criteria to determine whether the system should be calibrated to more readily accept these false reject situations.
In one embodiment, if a small number of false reject events precede a successful event within a small time period, then the wireless access system auto calibrates itself based on these values. In another embodiment, if a lower large number of false reject events are within ten percent of the current calibration value, the system would be calibrated to accept these events.
In another embodiment, in order to prevent imposters from spoofing the radio frequency access control system, the remote access device outputs an access request, the wireless access system sends challenged data to the access device determines the geolocation of the access device creates a response to the challenge data and encrypts the response with the geolocation data and transmits the encrypted response to the lock. The lock determines whether the location data encryption values correspond to an expected encryption corresponding to an expected position of the remote access device and authorizes access of a match is determined.
In another embodiment of the wireless access system, the wireless access system is provided with a first antenna and a second antenna, both located at the facility to which access is desired to be gained. The remote access device is placed a known distance from the first antenna. The communication is conducted between the remote access device and first antenna to determine a radio signal strength. The remote access device then communicates with the second antenna from the same known position or a different known position and the second radio signal strength is determined at the second antenna, the first remote signal strength is compared to the second remote signal strength to calibrate the first antenna and the second antenna.
In another embodiment, an accelerometer is disposed within a door within which the lock is also disposed. The accelerometer outputs a g-force signal as a function of movement of the door. A controller receives the g-force signal from the accelerometer, calculates a g-force plot as a function of force over time and determines whether the door is open or closed, as well as a position of the door. The controller outputs a signal to a user of the wireless access system if it is determined that the door is not fully closed, even if indicated to be locked.
In another embodiment of the invention, the access system queries the remote access device upon detection of a door closing event. The controller determines whether the radio signal strength is below a threshold value or is decaying at a predetermined rate. If the radio signal strength of the signal from the remote access device satisfies either of these conditions, the controller locks a lock disposed within the door.
In another embodiment of the invention, a touch sensor includes a capacitor if enough capacitance is added to the system, the touch sensor will determine that a touch event has occurred enabling control of the lock. If a controller determines that a predetermined number of touches has occurred within a predetermined time window, but the predetermined capacitance has not been reached, then a controller adjusts the capacitance threshold necessary to enable controlling of the lock.
In yet another embodiment, in order to determine that a remote access device is actually in position to access a lock, the access control system determines the radio signal strength of an access request from the remote access device. The controller at the remote access device determines whether the radio signal strength is greater than a predetermined value. If yes, then a signal is sent from wireless access system to the remote access device. The remote access device determines the radio signal strength of the signal from the wireless access system and permission to control the lock is only granted if the remote access device determines that the remote signal strength of the signal from the wireless access system is above a predetermined threshold.
In another embodiment, the wireless access system traces the whereabouts of a person within the facility locked by the lock of the wireless access system by determining that a user has gained access to the facility utilizing a remote access device. The access control system logs the time of access for the remote access device. The remote access system periodically pings the remote access device and determines whether the remote access device is within the facility or outside the facility for as long as the wireless access system determines that the user is within the facility.
In another embodiment, authorization credentials may be transferred or copied between a first remote access device and another by determining, utilizing a radio signal strength value, whether the authorized remote access device is within sufficient distance of the unauthorized device. Once it is determined that the devices are within sufficient distance from each other, authorization credentials may be transferred or copied to the unauthorized device.
In yet another embodiment, the mobile access device may be used to identify and pair two other devices in a preferred embodiment, the pairing is between an access point and the access control system. A user taps, brings the mobile device within a predetermined distance of the access point, and receives credential or identification information from the access point. The mobile device is then paired to the access control system and pairs the access control system with the information from the access point.
In yet another embodiment of the invention, a sensor is disposed within the cylinder of the door lock for detecting the insertion of a metal key to determine whether the lock has been locked or unlocked. If the sensor determines that a key has been inserted, an insertion signal is sent to a controller which disables other keyless methods for controlling the lock.
In still another embodiment of the invention, the remote access device provides security to the system by creating an updater command message which is broadcast the remote access device. If the remote access device receives the message, it determines whether the message is a control message and if so, the message is processed.
BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 is a schematic diagram of a wireless access system according to the present invention;
FIG. 2ais a perspective view of a lock constructed in accordance with the invention;
FIG. 2bis a perspective view of a lock constructed in accordance with another embodiment of the invention;
FIG. 3ais a top plan view of a remote access device constructed in accordance with the invention as a key;
FIG. 3bis a front plan view of a remote access device constructed in accordance with yet another embodiment of the invention as an application for a cell phone;
FIG. 4 is a front plan view of a Router Plug-in Unit of the wireless access system constructed in accordance with the invention;
FIG. 5 is a schematic diagram of the communication between the components of the wireless access system in a typical residential system layout in accordance with the invention;
FIGS. 6a-6dare a flow chart of operation of the wireless access system in accordance with the invention;
FIG. 7ais a diagram of a system showing the local communication between the remote access and the lock in accordance with the invention;
FIG. 7bis a diagram of a system showing range and location determination in accordance with the invention;
FIG. 8 is a diagram of a system showing the method of sending access control authorization from one remote access device to another in accordance with the invention;
FIG. 9 is a circuit diagram of a remote access device constructed in accordance with still another embodiment of the invention;
FIG. 10 is a circuit diagram of a PKE lock constructed in accordance with another embodiment of the invention;
FIG. 11 is a schematic diagram of a trip light circuit for sensing the presence of a user in accordance with the invention;
FIG. 12 is a flow chart of a method for calibrating the wireless access system in accordance with the invention;
FIG. 13 is a flow chart for a method for preventing unauthorized access in accordance with the invention;
FIG. 14 is a flow chart for a method for calibrating the wireless access system in accordance with a two antenna embodiment of the invention.
FIG. 15 is a flow chart showing a method for determining the status of a door containing a lock in accordance with one aspect of the invention;
FIG. 16 is a flow chart for automatically locking a door in accordance with another aspect of the invention;
FIG. 17 is a flow chart for calibrating a touch sensor in accordance with yet another aspect of the invention;
FIG. 18 is a flow chart for preventing spoofing of an authorized remote access device in accordance with still a further aspect of the invention;
FIG. 19 is a flow chart of a method for keeping track of a user utilizing the access control system in accordance with still another embodiment of the invention;
FIG. 20 is a flow chart of a method for transferring credentials between an authorized user and unauthorized user of the system in accordance with the invention;
FIG. 21 is a flow chart for a method for authenticating an internet access point in accordance with yet another embodiment of the invention; and
FIG. 22 is a flow chart for a method of locking out other methods of entry in accordance with the invention; and
FIG. 23 is a method for preventing spoofing of the remote access device in accordance with yet another embodiment of the invention.
DETAILED DESCRIPTION OF THE INVENTIONThe present description is made with reference to the accompanying drawings, in which various embodiments are shown. However, many different embodiments may be used, and thus the description should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. Like numbers refer to like elements throughout, and prime notation is used to indicate similar elements or steps in alternative embodiments.
Referring toFIGS. 1,2a,2b,3a,3b, and4, awireless access system10, for example, a PKE system, includes alock11. Thelock11 may be installed in a standard deadbolt hole and may be battery powered, for example. Thelock11 may be a human controlled (keyed) lock, for example (FIG. 2a). Thelock11 includes anouter cylinder12 that rotates freely around a standardkey cylinder13. When engaged, thecylinder13 is linked to a deadbolt14 (which may optionally be part of lock11), thus giving the user control to extend or retract the deadbolt utilizing their key. Thelock11 includes acontroller21 or processor andwireless communication circuitry22 for wireless communication which as will be discussed below, enableremote access device15 to operatelock11.
Alternatively, in another embodiment, thelock11′ may be motor powered (FIG. 2b). When a user is in sufficiently close vicinity or touches anywhere on the lock, or in proximity of the lock,11′, thedeadbolt14′ is driven by the motor (not shown) to open the lock for authorized users having theremote access device15. Of course, thelock11 may be another type of lock or locking mechanism and may be installed in any access point, for example.
Lock11 includes aproximity detector27 for detecting the presence of a user.Proximity detector27 outputs a presence signal in response to detecting a user. As discussed below,proximity detector27 may be a capacitance touch sensor, a button, a trip light circuit, a near field detector, a radio frequency signal strength detector, an audio switch (which actuates upon receipt of audio signals of a set frequency), or the like.Proximity detector27 outputs the presence signal tocontroller21.
In one non-limiting exemplary embodiment, lock11 is in a hibernation or low power level state. Upon triggering aproximity detector27 outputting the presence signal by a user's touch for example,controller21causes system10 to wake up and start listening for remote access device's15 advertisements. Upon finding aremote access device15, thelock11 communicates with (connects) to theremote access device15, determines if thedevice15 is an authorized user via a secure method such as an encrypted key exchange in one non-limiting embodiment.Lock11 then determines if theremote access device15 is in range to control thelock11, and ultimately provides access to an authorized user; all within a short or small perceived delayed time (ten seconds or less) if all the criteria is met.
Additionally, thelock11 may be advertising or listening (sending or sampling signals) at a low frequency rate in order to conserve battery power yet establish a communication link with theremote access device15 in advance of or in lieu of a user's touch. In this way, increasing the speed of the authentication process to create little if any perceived delay for the user.
In another embodiment, once thelock11 is touched by a user, the lockwireless communication circuitry22 changes states and starts listening for aremote access device15 advertisement. Once a connection is made authentication can be done upon connection, or upon lock or unlock request fromremote access device15. Once authenticated, thelock11 tracks the Received Signal Strength Indicator (RSSI) of the remote access device until the algorithm determines it is within a defined accessible range fromlock11. Thelock11 gathers RSSI data and utilizes this data in an algorithm to determine the position of theremote access device15. Once theremote access device15 is within a pre-determined accessible distance (control range), the lock grantsremote access device15 access control to lock or unlock thelock11. Additional antennas may be used in some embodiments for more accurate position determining, and to increase authorized user capacity and overall speed of thewireless access system10,
Alternatively, in another embodiment, the lock may be a doorknob lock, handle lock, or other style lock for example.
Referring now additionally toFIG. 3, thewireless access system10 includes aremote access device15. Theremote access device15 is advantageously a key or token authorized to control thelock11. In particular, theremote access device15 may be a standard key including acontroller16 for controllinglock11 via remote wireless access electronics coupled thereto (FIG. 3a).Remote access device15 also includes wirelesscommunication circuitry radio18 such as a radio in one non-limiting embodiment, for sending and receiving signals. In a preferred non-limiting example, the signal is a Bluetooth Low Energy signal.
Alternatively, or additionally, theremote access device15 may be a mobile wireless communications device, such as, for example, a Smartphone that may include the remote wireless access electronics described above cooperating with anapplication17′ stored in memory17 (FIG. 3b). Theapplication17′ may be configured to send a signal to provide access and control over thelock11′, for example. Of course, more than oneremote access device15′ may be used and may be another type of remote access wireless device, for example, a wireless FOB without the mechanical key, as will be appreciated by those skilled in the art.
Referring now additionally toFIG. 4, thewireless access system10 also includes a Router Plug-in Unit (RPU)30. Connected to mains power via a power source plug-in38 and the internet via aEthernet port37 to the home router. Acontroller32 controls operation ofRPU30. In one embodiment, theRPU30 includes aradio transceiver33 to communicate withlock11 and/orremote access device15, and utilizes a Bluetooth Low Energy communication protocol to communicate with thelock11.
TheRPU30 may link to an off-site web-basedserver34 via a communications network such as theinternet28, for example. This advantageously enablesRPU30 to receive near real time updates for adding or removing users, one-time access, extended access or specific timed access, and other connectivity related updates and functions atlock11, as will be appreciated by those skilled in the art. In addition, theRPU30 can sendlock11 status and transaction updates via theInternet28 to theserver34 which can be viewed on aremote access device15 orpersonal computer25, for example. Additional services may be selectively provided via the Internet using the connectivity ofRPU30 withserver34, for example. While theRPU30 is described herein as a plugin device, it will be appreciated by those skilled in the art that the functionality of theRPU30 may be embodied in any of a number of form factors, for example, such as a WIFI network or a mobile cellular based unit making use ofcell network35.
Referring now additionally toFIG. 5, a typical residential setup example of thewireless access system10 is illustrated. As described above with respect toFIG. 4, theRPU30 is typically plugged-in to the mains power via power source plug-in38 and to theinternet28 via the home router though an Ethernet cable andport37, at a location near the home router.RPU30 may also communicate wirelessly to thelock11, which may be installed on the front door, for example.
Operation of thewireless access system10 will now be described with reference additionally to the flowchart inFIG. 6. Thelock11, may initially be in a low power mode in astep101 to conserve battery power, for example. Thelock11 is typically in a low power mode; searching for authorizedremote access devices15′, for example a Smartphone or a RPU, at a lower frequency to conserve battery power, In one preferred non-limiting embodiment, when a user triggers theproximity detector27 by touch in a Step102, or another method, thelock11 begins to listen forremote access devices15 in aStep103, more specifically fobs in this embodiment. At the same time,system10 powers up and controller2 increases its broadcast and listening rate.
Iflock11 “sees” (receives) an advertisement from afob15 within a predetermined time period in aStep104, and thefob15 is authorized for access at that time as determined bylock11 in astep107, a connection is made betweenfob15 and lock11 in astep110. It is then determined whetherfob15 is still connected by determining whether communication has occurred within a predetermined time period in aStep112.
If thefob15 has not timed out, then in a Step114 alock11 performs a challenge response verification process to authenticate theremote access device15. Iffob15 is verified by comparing an identification portion of the advertisement signal to information stored atsystem10,lock11 begins to gather and process location and positioning data offob15 in astep117 utilizing Received Signal Strength Indication (RSSI) by way of non-limiting example. Utilizing the location and positioning algorithm instep117, lock11 can determine if the user is within activation range instep118. If the user is in the activation range as determined instep118, the control oflock11 is given tofob15 and thelock11 will lock or unlock as needed in astep119, then thelock11 disconnects fromfob15 in astep120 and returns to step100 to itslow power state101.
If inStep104 the advertisement from thefob15 is not received within a predetermined time window or the fob is not authorized as determined inSteps107 and aStep109 in which the signal is ignored, or the fob connection times out in aStep112, or the challenge response inStep115 is not an appropriate one, then the process returns to Step100 to be repeated.
In another embodiment,controller21 can enable locking the door without the use offob15. Ifproximity detector27, which may include a touch sensor, determines thatlock11 was touched at least a second time within a time window, preferably measured in seconds, in aStep106, thencontroller21 determines whetherlock11 is unlocked in astep108. If it is determined thatlock11 is in fact unlocked inStep108, then it is determined whether or not or not thelock11 is touched a third time within a predetermined time window measured in seconds or less, and if in fact thelock11 is touched three times within the time window, thencontroller21 causes lock11 to lockbolt14 in aStep113 and the process is returned to the beginning inStep100 to monitor for anotherremote access device15. If the deadbolt is not touched the prescribed number of times during the time window, inSteps106 and111, or is already in the locked state as determined inStep108, then the process returns to Step100 to await connection with another remote access device. In this way, a door can be locked merely by activatingproximity detector27, a predetermined number of times within a predetermined time period, or by continuously activatingproximity detector27 for a predetermined time period.
Reference is now made toFIG. 22 in whichproximity detector27 is withinlock cylinder13 to sense the insertion of a key15 withinlock cylinder13 in accordance with yet another embodiment of the invention. In many prior art electronic lock architectures, there is no method to determine whether a lock has been locked or unlocked using a mechanical key; a methodology most comfortable and familiar with a significant number of users. In accordance with the present invention, theproximity sensor27 may be withinlock cylinder13 to determine that alock11 has been locked or unlocked with amechanical key15. Furthermore, once a user has utilized the mechanical lock through direct interaction, it is desirable to disable other access methods. Furthermore, in accordance with the presence logging embodiments discussed above and below, by providingproximity sensor27, both within the outer facing lock receiving aperture and the inner facing lock receiving aperture ofcylinder13,sensor27 may determine whether the lock was locked or unlocked from the inside or the outside by registering a locked position change and determining if the change is due to another access method or by a mechanical key.
Specifically, in astep2201 as shown inFIG. 22, key15 is inserted intolock11. In astep2202,proximity sensor27 determines whether a key has been inserted. If yes, a signal is sent tocontroller21 and/or32 to disable other methods of access by either theremote access device15′ (smart phone embodiment) or the electronics in a fob associated with the key15. Ifsensor27 determines that a key has been turned in astep2208, then the key belongs to the lock and a report is sent to the lock owner that the lock status has changed instep2212 and the process ends instep2214. If the key does not turn instep2208, then the key is not a match for the lock and tampering has occurred a report is sent to the owner of the lock in astep2210.
Ifsensor27 has not determined that a key has been inserted, then in astep2205 it is determined whether an electronic locked or unlocked event described above has occurred. If it has, the process ends in thestep2206. If the electronic lock session unlock event has not occurred asdetermined step2205 by thecontroller21, then the lock is manually changed to a lock position from the interior of the door in astep2207. The process ends in astep2208.
In another embodiment, the system may work without the need to touchlock11 instep102. In this embodiment, lock11 andremote access device15 determine that they are within range of each other to begin processing without the need to initially touchlock11. This allows for the control oflock11 well ahead of being sufficient proximity of a door to touchlock11.
In this preferred non-limiting embodiment, an in-rangeremote access device15′, such as a Smartphone, responds in aStep121 to a broadcast advertisement from thelock11 in aStep121 bycontroller21. If theSmartphone15′ is authorized for access at that time as determined bycontroller21 in aStep122, a connection is made in aStep124 between aSmartphone15′ andlock11. IfSmartphone15′ is authenticated during a challenge response verification process inStep125, lock11 begins to gather and process location and positioning data in aStep127, utilizing RSSI or a signal from Global Positioning System (GPS) enabledSmartphone15, for example. The RSSI processing and authentication are preferably done in parallel so that the signal strength of authentication signals are used to determine the location ofremote access device15; speeding up the overall process. Utilizing the location and positioning algorithm inStep127, thelock11 can determine if the user is in activation range in aStep129. In anoptional Step128, lock11 may determine whetherlock11 has been touched prior to determining whether the user is in range inStep129. If the user is in activation range, lock11 will lock or unlock (reverse state) in aStep130.
As with the touch process, in this proximity determination process at anytime controller21 or32 determines that the response is inappropriate (Step125), orremote access device15 is not a one-time key (131) the process is returned toStep100 to begin again. However, if the button has not been pressed inStep128 then the process merely returns to redetermining the location ofremote access device15 inStep127.
A hybrid approach is also possible. In aStep105, once it is determined that the lock has been touched inStep102 and lock11 listens for a broadcast fromfob15 inStep103, if alock11 determines in astep105 that a Smartphone connectable advertisement response has been received within a predetermined time window; five seconds or less in a preferred embodiment, the process continues forSmartphone15′ atStep124 as described above. If the response is not appropriate, asdetermined Step105, then the process returns to the beginning inStep100.
In another preferred non-limiting embodiment, the location and positioning algorithm performed in aStep127 can utilize RSSI in formation from thelock11 to theremote access device15′. This can be done by theremote access device15′ receiving RSSI information from thelock11 and transmitting this RSSI information back to thelock11 to be processed bycontroller21 for location and positioning purposes.
In another preferred non-limiting embodiment, any unauthorized user can lock thelock11 by triggering the proximity detector three consecutive times within a predetermined time window such as discussed above inStep106. In another possible embodiment, thelock11 can be touched and held for greater than a predetermined time to lock thelock11.
In another preferred non-limiting embodiment, onlyremote access devices15 looking for a unique advertisement from thelock11 will respond with a connectable advertisement. In this way, the system can provide access control to many possible authorized devices without adding additional delays per additional authorized devices.
Authentication lends itself to several issues. As is known in the art, imposters can trick a radio frequency access control system by remotely capturing the RF data packets fromwireless access device15, then transmitting those packets through another medium (i.e., internet or cellular) to another device, to act as the imposter to thewireless access system10.
In one preferred embodiment, use is made of the GPS enabled features of the smart phone version ofwireless access device15 to further authenticate authorized users.
Reference is now made toFIG. 13 in which a method for authenticating a phone utilizing geolocation is provided. A GPS enabled wireless access device utilizes the position data for encryption purposes when transmitting the access request betweenwireless access device15 andlock11.Lock11 and/orwireless access system10 as a whole makes a determination that thewireless access device15 is within proximity of the lock and a fraudulent attack is not being attempted.
As seen inFIG. 13, in astep1301 accessingdevice15 requests access ofwireless access system10 andwireless access system10 begins the challenge/response authorization protocol withwireless access device15. In astep1302,wireless access device15 gathers geolocation data. In astep1303,wireless access device15 utilizes the geolocation data to encrypt the response to thewireless access system10 challenge data. In astep1304 the wirelessaccess control system10 reads the encrypted data response transmitted by radio broadcast bywireless access device15. In astep1305, the wireless access device determines whether the encrypted location data matches the expected location data that is known byaccess control system10 to correspond to the position of an authorized user gaining access. If not, then in astep1306 access is denied and a warning is sent to the authorized user ofwireless access system10. If there is a match instep1305, that access is allowed with the appropriate permissions as discussed below in astep1307.
In another embodiment of the invention, spoofing by imposters can be prevented by utilizing the RF signal strength as measured at bothlock11, or the overall wirelessaccess control system10, as well as at remote accessingdevice15. Wirelessaccess control system10 can determine whether remote accessingdevice15 is actually within an expected physical proximity to lock11. In other words, a calculation of RSSI is performed at wirelessremote access device15 and remoteaccess control system10. As a result, this minimizes the replay attack by requiring any imposter to be in close proximity to the door.
Reference is now made toFIG. 18 in which a method for preventing spoofing the system by an imposter is provided. In astep1801,remote access device15 requests access fromwireless access system10. Instep1802wireless access system10 determines the RSSI of the RF request signal. Instep1803,remote access system10 determines whether the RSSI of the request signal is greater than a predetermined threshold. If not, then the process stops instep1804 and access is denied. At time of manufacture, or during a follow-on set-up mode,remote access device15 stores an expected RSSI value for a signal fromlock11 corresponding to an appropriate position betweenlock11 andremote access device15 to controllock11. If, the RSSI of the request signal exceeds the threshold, then in astep1805remote access device15 determines the RSSI of a signal received fromwireless access system10. Instep1806,controller21 andremote access device15 determines whether the RSSI of the wireless access system signal is greater than a predetermined threshold. If not, access is denied and a warning of unauthorized entry is transmitted to the authorized user at their stored contact point. If the signal is greater than a predetermined threshold, then access is allowed with the appropriate permissions in astep1808.
In another methodology spoofing or hacking can be prevented by utilizing a unidirectional communication methodology to insure theaccess control system10 cannot be controlled by an outside device not intended to operate the system, but allows for coexistence with other electronic equipment.
Reference is now made toFIG. 23 in which updates and command messages fromaccess control system10 toremote access device15 are sent in an encrypted unidirectional message. Interaction withdevice15 is limited to, for example, acknowledgement of receipt of the message. Devices such askey FOB15 which are not intentionally set up to control theaccess control system10 have no control capabilities with implementation of the protocol inFIG. 23.
In astep2301, a new update/command message is constructed. In astep2302, a unidirectional message is broadcast fromaccess control system10 toremote access devices15. In astep2303, it is determined whether a message is received fromremote access device15. If no message is received, then in astep2304 the process ends and access is denied.
If the message is received fromdevice15, then in astep2305, it is determined whether or not the message is a control message. If not, then the message is disregarded and the process ends in astep2307. If the message is a control message, then the message is processed in astep2306 confirming that thedevice15 is authorized.
In another embodiment, information aboutremote access device15′ may be stored at any one ofmemory55, and memory associated withpersonal computer25 orserver34.Remote access device15 may have limited access to lock11. By way of example, access may only be during predetermined time periods of a day, or for a limited number of times; such as a one-time use key. If theremote access device15′, represents a one-time key as determined inStep131, this key will be deleted from the memory or stored in the memory ofsystem10 as an invalid key inStep132 to prevent further access.
In another embodiment in which theremote access device15′ is a Smartphone, tablet, or similar device, thelock11 may also request the user to verify their access control request by requiring the transmittal of a PIN, Password or other authentication code.Lock11 transmits a signal prompting the users, on theirremote access device15′, for example, via a display on their mobile wireless communications device to answer with a PIN.Controller21 compares the received password to authentication code previously stored by user atsystem10, prior to enabling control oflock11. This can be done to add additional security or to assist with inconclusive positioning or location information.
Referring now additionally toFIGS. 7aand7b, auser70, carries aremote access device15′, a Smartphone in their pocket for example. Assume theremote access device15′ is positioned within in-signal range90. In this case, a wireless connection is made between theremote access device15′ and thelock11. Theremote access device15′ is authorized to control thelock11.
In one non-limiting embodiment, when theuser70 approaches, their position is determined by receiving signals fromremote access device15′ at anexterior facing antenna52. Onceuser10 is withinactivation range91, and touches thelock11, thelock11 radio switches one or more times to aninternal antenna50 to verify theuser70 is on the outside. If the calibrated RSSI, as determined bycontroller21, or some other element ofsystem10, from one or more readings from theinternal antenna50 is less than the external calibrated RSSI reading or readings,user70 is determined bycontroller21 to be on the outside and thelock11 will lock or unlock. If the calibrated RSSI from theinternal antenna50 is greater than the RSSI reading or readings fromexternal antenna52,user70 is determined to be on the inside, within insiderange92 bycontroller21, and thelock11 will not operate as to prevent unauthorized entry.
Thewireless access system10 may include a calibration feature. More particularly, a connection between theremote access device15′ and thelock11 may be used by the algorithm to calibrate the RSSI input to adjust for varying antenna characteristics ofremote access devices15′ or changes in user behavior or environmental conditions, for example. In one non limiting example, thelock11 determines RSSI values forremote access devices15′ unlocking and locking events over a number of distinct communications. It then determines a maximumaverage activation range91 value to calibrate with.
In another non limiting embodiment, thelock11 can request that theremote access device15′ send its RSSI values as received from thelock11 and utilize these to calibrate forremote access device15′ antenna differences. Reference is now made toFIG. 14 wherein a flow chart for showing the method for calibration of the system is provided. The process is begun in astep1401 with a start command either fromlock11 orremote access device15′. In astep1402,remote access device15′ is placed at a known location relative toexternal antenna52.Remote access15′ communicates withlock11 and the RSSI values are determined.Remote access device15′ may either be maintained at the same position or moved to a position which is the same distance as the first communication was from thefirst antenna52 from thesecond antenna50. Communication is initiated and the RSSI values are determined in astep1403. In astep1404, the values are compared to expected values for those known distances at each antenna. The process may be repeated for different positions and any adjustments to compensate between derivations from the expected values and the obtained values are determined and utilized bycontroller21 to calibrate the system. This process may be used with two or more antennas.
If a user incorrectly calibrates theremote access device15′ in a radio frequency (RF) electronic access control system, or if the RF properties of the control device change over time, an auto calibration system may be implemented in one non-limiting preferred embodiment to improve the efficiencies of the overall system and the appearance of instantaneous control to user. In another embodiment, the calibration is continuously self-adjusting per the last “n” number of access control events as to adjust for user behavioral changes or local condition changes over time.
Reference is now made toFIG. 12 in which one embodiment of capturing n access control events for use in calibration is provided. False reject events may be utilized to calibrateaccess system10. By capturing and storing the radio frequency received signal strength of each false reject event,wireless access device15 can develop an algorithm to auto adjust the RF activation range threshold. In this way,remote access device15′ learns and adapts to the environment. The RF received signal strength data can be stored and calculated on theremote access device15 minimizing the process and memory requirements on the access control device side. This methodology may also be utilized to increase security by adjusting the behavior of the system based on accepted events to limit the RF activation range threshold.
As seen inFIG. 12 a false reject even happens in astep1201. A false reject event is an event in which access is denied to theremote access device15′, even though access as determined by a determination thatremote access device15′ should be granted based upon a determination that access has been previously granted for thatparticular lock11 from the known distance. This may be determined either as a current RSSI reading atremote access device15 as compared to previous readings, a position determination utilizing GPS or any other methodology for determining thatremote access15′ is at a position at which access should have been granted. Other pass criteria may be that a small number of false reject events which immediately precede a successful access event within a small predetermined time period. By way of non-limiting example, one to two false rejections within ten or less seconds, of a successful transmission would be one such criterion. These rejected events would be used for the auto calibration. Another methodology would be that if a large number of false rejection events are within ten percent of the current RSSI acceptance value, the system may be recalibrated to accept the access signals from theremote access device15′ which are within a ten percent range.
In astep1202 it is determined whether the false reject event has the characteristics to be used for the calibration process. By way of non-limiting example, within ten percent of the calibrated accepted activation level. If not, the process ends in astep1203 until another false reject event occurs and the process begins again instep1201. If instep1202 it is determined that the false reject event has the necessary characteristics, then in astep1204 thesystem10 receives the RSSI values for the false rejects and recalibrates itself to recognize the RF electronic access control signal as appropriate to prevent further false reject events. It does this by readjusting the reject criteria for the RF/RSSI foraccess control system10 and storing the new threshold.
Thewireless access system10 may also include acomputing device25, for example, a personal computer at the user's residence for use in a revocation process by way of example. Thecomputing device25 may include circuitry for wirelessly communicating with theRPU30,remote access device15, and/or lock11 for revoking a permission fromremote access device15. For example, thecomputing device25 may include Bluetooth Low Energy communications circuitry, for example. Other devices and communications protocols may be used in the revocation process.
While thewireless access system10 is described herein with respect to a door, the wireless access system may be used for access control or protection of, but not limited to, appliances, a safe, heavy machinery, factory equipment, power tools, pad locks, real estate lock-boxes, garage door openers, etc., for example. Alternativeremote access device15 embodiments may include a pen, watch, jewelry, headset, FDA, laptop, etc., for example. Thewireless access system10 may be used to protect other devices or areas where it may be desired to restrict access.
The present invention lends itself to a process for transferring one-time, limited time, or permanent use Passive Keyless Entry (PKE) token key codes to a cellular or other wireless mobileremote access device15′ for use with PKE access control devices, such aslock11 for example. Reference is now made toFIG. 8. In one exemplary, but non limiting embodiment, a first user has a firstremote access device15′ embodied in a mobile communication device that is PKE enabled and is known to lock11 as an authorized user. A second user has a second remote access device embodied in amobile communication device15″ that is PKE enabled, but is not authorized for use withlock11. Both users can communicate locally withlock11 via a wireless Bluetooth Low Energy network as discussed above for example. Furthermore, both users have the ability to communicate with each other via acellular network35 as known in the art, or other wireless communication and as a result have an almost unlimited range.
The authorized user oflock11, chooses to send an unauthorized user an authorized token for thelock11 by way of amobile application17′ on authorizedremote access device15′ to unauthorizedremote access device15″. The authorized user can select the option withinmobile application17′ on authorizedremote access device15′ for a one-time, limited time, or permanent token to send to unauthorizedremote access device15″.
In one exemplary, but non limiting embodiment, the authorization credentials are transmitted from the authorizedremote access device15′ to the currently unauthorizedremote access device15″ via thecellular network35. Now unauthorizedremote access device15″ stores and makes use of the authorization credentials and becomes an authorized user of thelock11. Another embodiment can be that authorizedremote access device15′ sends a request for information to unauthorizedremote access device15″ which responds to authorized remote access device with useful information such asdevice15″ Bluetooth address and authorization permissions and/or credentials. This information is then transmitted from authorizedremote access device15′ to theRPU30 via thecellular network35 to the internet, then from the internet to ahome router36 that is connected to theRPU30. TheRPU30 then transfers identification information wirelessly to thelock11, so that when the now authorizedremote access device15″ tries to access thelock11, it is already a known remote access device, thus speeding up the initial access control process.
It should be noted that the use of the mobile phone cellular network was used by way of non-limiting example. The key code can be sent directly to another device via SMS text message, Email, or other data communication protocols. Additionally, the key codes can be sent to another device throughserver34, or a server disposed in the communications network, which can also act as a master database. Additionally, the key code master database can allow a user to manage (send, receive, revoke) locks from a secured webpage. Additionally, the key code master database, permissions and/or credentials and identifications may be used to restore a device's key codes via a mobile application with verification upon a lost or damaged device.
Reference is now toFIG. 20 in which a methodology for transferring an access authorization between an authorizedremote access device15′ and an unauthorizedremote access device15″. Theremote access device15′ utilizes radio frequency RSSI values so that as an authenticatedremote access device15′, it can determine that the yet to be authenticatedremote access device15″ is in range. In response to a user trigger as discussed above,remote access device15′ can either transfer or authorize the unauthenticatedremote access device15″. By way of example,remote access device15′ in a smartphone embodiment, may display an outline of a FOB as a graphical user interface (GUI) prompt for the user to bring the unauthorizedremote access device15″ (a FOB or other smartphone) in sufficient proximity to authorizedremote access device15′ including, in some situations, direct physical contact. When the unauthorizedremote access device15″ is placed on the screen ofaccess device15′, the RF RSSI value is sufficiently high to grant permission to begin the key transfer between the authenticateddevice15′ and the to be authenticateddevice15″. In this way, key transfer may be accomplished out of communication range fromwireless access system10.
More specifically, as seen inFIG. 20, the authorized device initiates authorized access device key transfer in astep2001. In astep2002, theunauthorized device15″ and the authorizeddevice15′ are placed within a predetermined, but close proximity of each other. Close proximity is a proximity sufficient to provide sufficient signal strength between the two devices for transfer with each other, but not transfer with an unintended third device. In a preferred embodiment, proximity is six inches or less between each other.
In a step2003, the authorizedremote access device15′ determines whether the RSSI from theunauthorized device15″ is sufficiently strong, i.e., above a predetermined threshold. If not, the process stops in astep2004 to prevent inadvertent transfer. If the RSSI is sufficiently strong, then key transfer occurs in astep2005 by transmitting the authorization information from authorizeddevice15′ toremote access device15″.
If a stand-alone internet access point such as alock11, or even two stationary components such aslock11 andRPU30, is to be connected withaccess control system10, a secure method is needed to pair the two using a third electronic device, taking advantage of radio frequency communication amongst the devices. The third electronic device is an authorizedmobile device15′ preferably having GUI. As seen inFIG. 21, in astep2101, access point and access control system pairing is initiated bymobile device15′. The user is prompted to bringmobile device15′ into close proximity, as described above, to access to the access point (such as RP430) by way of example.Access point30 begins a pairing procedure with the access control system in astep2103 in response to the prompt. The user is then prompted to bringmobile device15′ into close proximity with wirelessaccess control system10 such as atlock11, by way of non-limiting example. In astep2105, theaccess control system10 begins the pairing procedure withaccess point30. Instep2106,access control system10 andaccess point11 perform authentication as described in detail above. As a result instep2107, access control system and anaccess point11 are paired. In this way, two immobile devices, neither of which necessarily has a graphical user interface may be paired utilizing an authenticated mobile device such asremote access device15.
This present invention also lends itself to revoking authorization. In a process to revoke a key where the key is a smart phone, tablet or the like, once a user decides to revoke a key code, the user may send a termination request directly to the remoteaccess device key15′ being revoked, via thecellular network35 usingcomputer25 or another computing device. If there is no response, the request is broadcast to users, for example, all users, in the “approved” network (i.e. users enrolled in the same lock11). The request is stored in the background memory on their respective keys. Then when any authorized user is in range of thelock11, the claimant request is activated and the key code of the requested revoked user is revoked from the lock, denying access to the revoked user. In another embodiment, the revoked key information can be sent via thecellular network35, or through theinternet28, to theRPU30, then to thelock11 to disable access.
With respect to power conservation and increased security methods for thelock11, aremote access device15 for example, may include the remote access application and a global positioning system (GPS)receiver23. The GPS receiver may be used to track the location ofremote access device15 relative to the position oflock11 and enable communication by thelock11 only when theremote access device15 is within range, by geo fencing for example. If theremote access device15, i.e. mobilewireless communications device15′ is outside the range, as determined by theGPS receiver23,remote access15 may tell thelock11, via thecell network35 andinternet28 through theRPU30 to go into sleep mode or turn off. Additionally, or alternatively, the location of the mobilewireless communication device15′ may be determined via triangulation with wireless service provider base stations or towers, for example.
Alternatively, or additionally, theremote access device15 or mobilewireless communications device15′ may wake up, determine a position, calculate a fastest time a user could be within range of thelock11, then wake up again at that time and recalculate. When the user is within the range, it may enable theremote access application17, and, thus communication for authentication or other purposes. Alternatively, or in addition to this method, lock11 or the RPU may determine a distance between theremote access device15 andlock11 and change the length of the interval and/or frequency of occurrence of each communication as a function of the distance.
Another method in which to conserve power consumption withinremote access device15 is to provide a wake-up mechanism internal toremote access device15. Reference is now made toFIG. 9 in which a remote access device generally indicated as15 constructed in accordance with another embodiment of the invention is provided. The circuitry as shown inFIG. 9 may be provided in any form factor known for a portable remote access device which as shown above is disposed within a cellphone, within a key, a fob, or any other portable entry device known in the art.
Remote access device915 includes a radio signal generator918 powered by abattery900 to provide portability. Radio signal generator918 generates a radio signal to be transmitted by anantenna53 to be received at thelock11 to gain access to the door in which a lock is provided as discussed above. Acontroller16 controls operation ofremote access device15 and provides an input to radio signal generator918. Anauthentication chip24 provides an information input to thecontroller16, such as security identification information, encryption information, permissions, authentications, and the like to be carried by the radio signal generated byradio18 and recognized at thelock11. In an alternative embodiment, the authentication process can be performed on thecontroller16.
Ifradio18 were to continuously output a radio signal even when the fob is not in use, it would exhaustbattery900 at a higher rate requiring frequent replacement, if replacement were even possible in some key fob constructions. A trigger mechanism is provided withinkey fob circuitry915 to begin the creation of a radio signal by radio signal generator918. In one preferred embodiment, anaccelerometer39 is provided withinkey fob circuitry915 and outputs an acceleration signal to thecontroller16 upon acceleration of thekey fob915. The acceleration signal is output to thecontroller16 and the radio signal generator918 is triggered to begin generating a radio signal. Radio signal generator918 includes an onboard counter for measuring a predetermined time period during which transmission of the radio signal generator918 occurs. The signal from theaccelerometer39causes controller16 to begin the transmission of the radio signal, and absent the acceleration signal, after the predetermined time period, the radio signal generator918 does not operate. In this way, a radio signal is only produced whenfob15 is moving; such as when a person is in motion and approaches a lock carrying the fob for example, and not producing a radio signal when someone removes thekey fob15 from their pocket and sets it down on a table for example.
In one embodiment, light emitting diodes (LED)901 are provided for providing a visual signal to a user ofkey fob circuitry915. By way of example,LED901 may be powered during transmission of the radio signal by radio signal generator918, or may indicate a low battery condition.
By use ofkey fob circuitry915, battery life is increased by limiting the transmission of the advertising radio signals to times whenremote access device15 is in motion. This also increases security if the user were to leave their keys near thelock11, but just on the inside of the door. If the key were in a bowl or on a table near the door as often done, no motion would be sensed and the radio signal would not be triggered so there would be no false acceptance of an outside user resulting from the transmission of the radio signal while the key is on an interior side of the lock.
Reference is now made toFIG. 10 in which a circuit for a lock, generally indicated as1011, having a proximity sensor triggered wake-up operation is provided.Lock circuit1011 includes a connection to an electronic lock1014 mounted within a door. Electronic lock1014 is controlled by signals output by acontroller21. Thelock circuit1011 also includes a radio signal generator1022 for communication withremote access devices15. Thecircuitry1011 is powered bybatteries1000. The radio1022 receives radio signals from aninternal antenna50 and anexternal antenna52. These antennas to the radio1022 may be controlled by aRF switch1001 which switches between theinternal antenna50 andexternal antenna52. For the purposes of this description, internal is a direction facing within the dwelling that includes the door in which lock11 is disposed while external is the outwardly facing direction outside of the dwelling or structure which contains the door in which the lock is disposed. Theexternal antenna52 may be disposed on an external side of the door. The antennas are directional antennas. It should be noted that it is well within the broadest scope of the invention to provide a radio for each antenna.
The Radio1022 operates under the control of acontroller21,memory55,accelerometer26,authentication unit54,real time clock1002, andproximity detector27. During operation,controller21 is dormant, not actively controllingbolt14 or electronic lock1014, so it maintains its current condition until acted upon.Proximity detector27 may be a capacitance detector as discussed above.Proximity detector27 outputs apresence signal10 when the proximity of a user is detected, toradio controller21 to wake upradio22 to begin authentication to ultimately perform the lock or unlock operation.
It should be noted, thatproximity detector27 takes the form of a capacitance detector. However, as seen inFIG. 11,proximity detector27 may include anLED1102 and photo detector circuit1104 between ahandle1106 andlock1111 to form a trip light circuit. In this way, a user touches either one ofhandle1102 orlock1111, the user blocks the light path, breaking a light circuit as known in the art to signal the presence of the user.
Alternatively, theproximity detector27 may also be a near field detector, a magnetic field detector, or even a radio signal detector for detecting the signal from a remote access device such asremote access device15 as it is within close proximity oflock11. In yet another embodiment,proximity detector27 may take the form of a second lock, or handle, such as on a screen or storm door. Activation of the second lock is detected byproximity detector27 which outputs a presence signal.
In the touch embodiment,proximity detector27 measures capacitance and detects the discharge of a known capacitor value andcontroller21 compares the calculated value with the known capacitor value after a touch event. If enough capacitance has been added to the system,proximity detector27 will trigger a touch event; allowing the process to begin. However, during varying weather conditions, the sensitivity of a capacitance basedproximity detector27 may change. By utilizing aproximity detector27 with actively adjusting sensitivity, i.e. utilizing a variable capacitor or other method, the sensitivity of the sensor may be adjusted to reduce false touch activations in such conditions.
Reference is now made toFIG. 17 in which the method of operation oflock11 to adjust the sensitivity of a touch sensor embodiment is provided. In a step1701auser touches theproximity detector27 embedded withinlock11. In astep1702,controller21 determines whether a predetermined number of touches has occurred within a predetermined time period. If not, then the touch event process (locking or unlocking the door) is performed in astep1704. If it is determined that number of touches has occurred in a predetermined time, this indicates that more than the required number of touches was performed andcontroller21 adjusts its sensitivity accordingly in astep1703.
Lock circuitry1011 also includes amemory55 for storing data such as recognition information for authorized users or even periods of operation corresponding to specific users. By way of example, staff at a facility may only be provided access during their shift occurring at a known predetermined time.Memory55 may also store active time periods of the day such as morning, or afternoon, whenlock11 is most in use.
Areal time clock1002 provides a real time output tocontroller21 which in conjunction with access times stored inmemory55 determines when to provide access for certain authenticated users, discussed in more detail below, or when to stay on such as during known busy time periods to eliminate any operating delays. For example, between the hours of 8:00 and 9:00 when people may be showing up for work, or in a residential setting, the hours of 2:00 to 4:00 when children are returning from school, one may want theradio22 to be broadcasting or listening at a faster rate to eliminate any delay in the operation of locking or unlocking the door.
TheAuthentication chip54 or authentication software running onsystem10, creates public and private keys to be used by thecontroller21 to authenticate and confirm the identity of the authorizedremote access devices15. Theauthentication unit54 which includes encryption data for encrypting communications transmitted by radio1022 or unencrypting messages received at either one of theantennas50 or52.
During operation, a user will approach ortouch lock11 to be detected byproximity detector27 sending a user interaction signal to thecontroller21. The radio1022 will receive signals from aremote access device15 at one or both ofantennas50 and52. The received signals will be processed by thecontroller21 to determine position and location as described above. Additionally, the controller verifies theremote access device15 is authorized for access at that time as determined by utilizing thereal time clock1002 and data stored inmemory55. If access is permitted, or permitted as a function of time of day, then the actual signal received by the radio1022 will be authenticated utilizing theauthentication chip54.
If the radio signal is recognized by thecontroller21, thecontroller21 will lock or unlock theelectronic lock14.
Anaccelerometer26 may also provide an input to theradio22 via thecontroller21. Anaccelerometer26 embedded in the door senses when the door is open or closed, or even experiences vibration such as a knock. In the absence of authorization as a function ofmemory unit55 working with thereal time clock1002 and/or authentication processing utilizingauthentication chip54, the triggering ofaccelerometer26 is an indication of an unwanted person at the door or even a break-in. In one embodiment, if a signal is received fromaccelerometer26 in the absence of other authorizing indicia, then thecontroller21 may send a signal via the radio1022 along either one ofinternal antenna50 orexternal antenna52 toremote access device15 orRPU30 to cause an alert to be sent to a selected user.
Use of the accelerometer to detect door openings and closings as described above provides an advantage over prior art detection systems which utilize an interlock feature; a mechanical switch indicating the condition of the door (open or closed). By using the accelerometer at the lock, or embedded within the door, no additional wiring based on feedback from the accelerometer is required. The use of g-force plots output by the accelerometer can be used to determine door open and closed events knowing the door starting position as closed. Spike in acceleration can be used to determine if the door has been open or closed, or if the door is partially closed. Each door type will have unique traits which may be utilized as part of an algorithm to determine door position. This, coupled with a bolt position sensor insures that a door is fully or closed and secured/locked.
As seen inFIG. 15 upon movement of the door, the accelerometer is activated from the door open or closed position in astep1501. In astep1502, the g-force as experienced over time are calculated based upon accelerometer outputs and are utilized bycontroller21 to determine door position in real time in astep1503. Instep1504,controller21 causesradio22 to output a signal which informs the user as appropriate whether the door is either not fully closed or not locked.
Once the door is determined to be closed, as determined above, then the door may be locked. The door may be locked as a timed event, in other words, locked in predetermined time intervals, after the door is determined to be closed and no activity is sensed at the door bylock1011. However, communication with wirelessremote access device15 may also be used to automatically lock a door rather than a time period which may be artificially long and to maintain a door in an unlocked condition longer than desired or needed.
Reference is now made toFIG. 16 in which a method for operating alock1011 for automatically locking the door in accordance with the invention is provided. To determine if the door has been closed through the outputs ofaccelerometer26 as discussed above. Instep1601,lock1011 communicates withremote access device15 and determines the RF signal strength of a return signal fromremote access device15. In astep1602, it is determined whether no signal is returned or whether the RSSI of the return signal is less than a predetermined threshold or is decaying at a predetermined rate. Any of these conditions would indicate that theremote access device15′ has left an acceptable vicinity for return, i.e., more likely to leave than return to the door; andcontroller21 controlselectronic lock14 to lock. If the signal is still stronger than the predetermined level as determined instep1602, then the process returns to step1601.
Thewireless access system10 may be used to augment multi-factor authentication, e.g. use with a biometric identifier, personal identification number (PIN) code, key card, etc. Thewireless access system10 may also allow simultaneous multiple authentication of remote access device, for example, mobile wireless communications devices. More particularly, thewireless access system10 may require a threshold number of authorizedremote access devices15 to be present at a same time for authentication to succeed.
Thewireless access system10 advantageously may provide increased security, for example. More particularly, thewireless access system10 may force the user to authenticate in addition to authorization, via theremote access device15 before the door can be opened. For example, theremote access device15 may include anauthentication device24 for authentication via a biometric, password, PIN, shake pattern, connect-the-dots, or combination thereof, for example, prior to accessing thelock11. In the case of theremote access application17 on a mobile wireless communications device, for example, the application may have multiple security levels to enable these features, as will be appreciated by those skilled in the art.
With respect to security features, by using proximity sensors, switches, or the like, thewireless access system10 may indicate whether a user locked the door, for example. When a user locks the door, for example, theremote access application17 may log “Lock” with a time stamp so that it may be tracked and checked on theremote access device15, i.e. the mobile wireless communications device, for example. Thewireless access system10 may include asensing device26 for example, an accelerometer to track door openings, for example. Based upon the accelerometer, data may be provided through the application or via the Internet or other network, for example. Thesensing device26 may be another type of device, for example, a touch sensor.
In one advantageous security feature, when the door is opened, or an attempt is made to open the door, which may be detected by theaccelerometer26 or other door opening determining methods, as will be appreciated by those skilled in the art, known, and even previously revoked,remote access devices15 in range and/or discoverable devices, may be recorded along with a time stamp. This may capture an unauthorized user, for example.
Another advantageous feature of thewireless access system10 may allow authorized visits, for example. More particularly, an authorized visit may be enabled by a911 dispatcher or other authorized user to allow special or temporary access by the smart phone of a normally unauthorized user, for example. Thewireless access system10 may keep a log/audit trail. Approval may be granted by trusted a friend or special authority, for example, emergency medical services, a fire department, or a police department.
Thewireless access system10 may also include a security feature whereby when a threshold time has elapsed, the wireless access system may ignore aremote access device15 in range. This advantageously reduces or may prevent unauthorized access that may occur from leaving aremote access device15 that is authorized inside near the door. A timeout function (via a timer, not shown) may additionally be used in other undesired entry scenarios. Thewireless access system10 may also log all rejected pairing attempts, as will be appreciated by those skilled in the art.
Thewireless access system10 may also include a revocable key security feature. For example, thewireless access system10 may include both revocable and non-revocable keys. If, for example, thewireless access system10 is unable to access theserver34 to verify keys, for example, the wireless access system may force theapplication17 on theremote access device15, for example, to check the servers. If thewireless access system10 is unable to connect or verify the keys, access is denied.
The identification of remote access device may be stored inmemory55 or atserver34, orcomputer25. The status of the key as a one-time key, or limited duration key may also be stored. During the authentication process, lock11 may compare the identification and/or password information with information stored withinsystem10 to determine whether access has been revoked or expired.
For example, the revocable key feature may be particularly advantageous to keep an old boyfriend, for example, who is aware that his key is being revoked from being able to turn off hisremote access device15 so that the key is not deleted. However, a wireless connection for theremote access device15 may be a prerequisite to access in some instances.
As will be appreciated by those skilled in the art, thewireless access system10 has the ability to transfer a key from oneremote access device15 to another with theremote access application17, for example. It may be desired that these keys be revocable in some configurations. However, if theremote access device15 with the key to be revoked is not accessible via thenetwork28, then revocation may not be guaranteed if thelock11 is offline, for example. Thewireless access system10 advantageously addresses these challenges.
A proximity detection feature may be included in thewireless access system10, and more particularly, theremote access device15 may use a magnetic field sensor, such as, for example, a compass in mobile wireless communications device, as a proximity sensor to obtain a more uniform approach/departure distance calibration. A magnetic pulse or pulse sequence may be used in thelock11 to illuminate a magnetic flux sensor in theremote access device15 to establish proximity.
Additionally, theremote device15, for example, a mobile wireless communications device or mobile telephone, may be qualified using both radio frequency (RF) and audio, for example. Theremote access device15 may be a source or sink of audio to help qualify proximity.
In another embodiment, as an alternative to a human driven lock, as noted above, a turn-tab (not shown) may be included that will “flip out” of the front of thelock11 when pressed to allow the user to turn the lock on anun-powered deadbolt14. It may be desirable that the surface area be no larger than a standard key, for example. The user pushes the turn-tab back into the lock face when done. The turn-tab may alternatively be spring loaded, for example.
In another embodiment, the turn-tab (not shown) may be added to a powered lock, for example thelock11 described above. This is may be useful to help force ‘sticky’ locks, for example, as will be appreciated by those skilled in the art. This may also allow the user to give a manual assist to the motor in case of a strike/deadbolt14 misalignment. This may also allow for operation in a low battery situation, for example. The turn-tab may be particularly useful in other situations.
Additionally, one of the deadbolts may have a traditional key backup as it may be needed for emergencies, for example, while the remaining deadbolts on a house may be keyless. This may eliminate the need to match physical keys on multiple deadbolts, and may reduce the cost for additional deadbolts.
Thewireless access system10 may also include an additional access feature. For example, with theRPU30 connected to theInternet28 through thehome router36, this provides access to theserver34 for example, it may be possible to have thelock11 unlock via a command from theRPU30 through the Internet. In other words, thelock11 could be opened for users who don't have aremote access device15. More particularly, they could call a call center or service that could unlock thelock11 via theInternet28, for example, or via other wireless communications protocol. Also, an authorized user could provide this action as well. Additionally, fire/police could gain access by this method if the lock owner opts-in to this service. As will be appreciated by those skilled in the art, alternatively, a command could be sent from theremote access device15.
Thewireless access system10 may also include an activation indication. For example, theremote access device15 can signal the operator via an auditory tone, vibration or other indication when the lock is activated. This may help communicate actions to the user to reduce any confusion.
Thewireless access system10 may also include an additional security feature. For example, thewireless access system10 may use an additional authentication channel, for example, via a WLAN, WiFi, or other communication protocol, either wired or wireless, with theremote access device15. This may improve authentication and make spoofing considerably more difficult, as will be appreciated by those skilled in the art.
As another security feature of thewireless access system10, if cell service and data service, for example, if theremote access device15 is a mobile phone, are turned off, remote access application may consider this a threat related to key revocation and authentication may not be approved.
Also, thelock11 may include a radar device, or a radar device may be coupled adjacent the lock to detect the locations of the entrant by facing outward in its sweep to resolve inside/outside ambiguity, for example. If the radar does not detect an entrant, then by default the holder of the remote access device is inside and the lock is not activated.
Thelock11 includes an interior facingdirectional antenna50 and a an external facingdirectional antenna52. Each is operatively coupled to theradio22 to send signals to, and listen for signals from,remote access devices15. If aremote access device15 is on the interior of the lock, then the interior facingdirectional antenna50 communicates withremote access device15, and the calibrated signal strength sensed bydirectional antenna50 will be greater than the calibrated signal strength sensed by directional antenna52 (which may be no sensed signal).Lock11, and inturn system10, determine that remote access device is inside the home, dwelling or structure. Conversely, ifremote access device15 is exterior of the lock, exterior facingdirectional antenna52 communicates withremote access device15 and the signal strength atdirectional antenna52 is greater than the signal strength received atdirectional antenna50.System10 determines thatremote access device52 is outside of the dwelling and operates as discussed above. Thelock11 compares the signals from interior facingdirectional antenna50 and exterior facingdirectional antenna52 to confirm the location ofremote access device15 prior to enabling theremote access device15 to controllock11. This prevents undesired unlocking if an authorized user is inside the door.
It is known in the art including, from the above, it becomes readily apparent thatwireless access system10 can track the time that a user attempts to accesslock11. However, an additional benefit provided by the structure and methodology of communicating withremote access device15 while it is in interior of the door overcome a problem with fingerprint readers and other user stimulus log-ins. Namely, tracking the time that a user is within a facility; not just the fact that a door has been opened.
Reference is now made toFIG. 19 in whichwireless access system10 periodically pingsremote access device15 utilizing a Bluetooth or radio frequency signal or other medium to determine that the user is still within the access controlled location.Wireless access system10 can also listen for pings from remotemobile device15. Utilizing the RSSI, and other positioning techniques,wireless access system10 determines that a user is passing through a doorway and in which direction. This is particularly facilitated by the two directional antenna arrangement of the invention.
In astep1901,remote access device15 gains access through the door utilizing wirelessaccess control system10 through any of the embodiments discussed above. In astep1902,controller32 orcontroller21, ofwireless access system10 logs the time of access forremote access device15 in astep1902.
In astep1903, the wireless access controls system pingsremote access device15. Based on RSSI differential as discussed above or other positioning techniques, in astep1904 wireless access control system determines whether the position ofremote access device15 is within the monitored area. If the device is confirmed to be within the monitored area instep1904, the process returns to step1903. If it is determined by either ofcontroller21 or32 thatremote access device15 is no longer within the area, then the process is stopped in astep1905.
A mechanical or zero/low-power tilt sensor may be configured to detect break-in events, for example to thelock11. Upon a detected break-in, thelock11 activates and thereafter communicates to theRPU30 to report an intruder alert. Thelock11 may also store information, in a memory, for example, if home-connect plugin is off-line.
Indeed, while the different components of thewireless access system10 have been described with respect to a wireless protocol, it will be appreciated by those skilled in the art that the components may communicate via a wired network and protocols or a combination of wired and wireless networks. Additionally, while Bluetooth, Bluetooth Low Energy, and WLAN (i.e. WiFi) has been described herein as wireless protocols of particular merit, other wireless protocols may be used, for example, Zywave, ZigBee, near field communication (NFC), and other wireless protocols.
Many modifications and other embodiments of the invention will come to the mind of one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is understood that the invention is not to be limited to the specific embodiments disclosed, and that modifications and embodiments are intended to be included within the invention.